As everyone is now aware, Mt Gox has declared bankruptcy. As what appears to be the very last thing they did, Mt Gox accepted my $35 and fulfilled my special Mt Gox Yubikey. Having just arrived in the ...

I'm new to GCM and I need to implement it in hardware, using FPGA.
The data bus is 640 bits, so I will use 5 adder/multiplier blocks in parallel.
The message size and AAD size are constant.
My design ...

I'm a little bit confused about the design of a RSA module in VHDL. My question isn't directly related to hardware design. I've read a lot of publications and I bought also a book. In one publications ...

I'm trying to undestand how it works and how to implement the algo described in
this paper. The paper shows a methods to compute a modular multiplication where it is used multiplier with a resolution ...

Question is a follow-up to this one. The question was about accelerating SHA1. I am writing an application, where I do have a choice of hash algorithm, as long as it's a strong one. I want to be able ...

I've always been curious as to how Pay-TV and other Conditional Access systems actually stay secure for any amount of time, given that they are usually one way and (I'm assuming) use symmetric keys ...

Is there way to make encryption scheme ASIC and GPU resistant, besides using a lot of memory?
And what is there ciphers or modes of use for such purpose? Including public keys algorithms maybe too, ...

I have a question about random number generators.
I have read from a real random number generator, based on a webcam ("randcam"). My problem is, that I do not really understand how the generation of ...

As far as I understand it, the hardware key-fob two-factor systems such as RSA SecurID depend on secret algorithms, and employ tamper-resistant hardware to prevent reverse engineering.
Is there some ...

In the past year or so we have seen production of ASIC devices designed for mining of cryptocurrencies. These devices can perform SHA256 hashing at rates much higher than was seen in the past and are ...

Intel has an on-chip RdRand function which supposedly bypasses the normally used entropy pool for /dev/urandom and directly injects output. Now rumors are going on that Intel works together with the ...

This is the sequel to my previous question about AES block cipher modes of operation.
(See: AES block cipher modes of operation)
Now, here is my real problem. I have to use a block cipher with 8 bit ...

I have just advanced to the last grade of high school (in Denmark). In this year, we all get to do one big project, where we can build/invent/create whatever we want to "solve a problem". As I study ...

I have a FPGA and am curious what cryptographic applications I can use with it. I'm just a hobbyist / security researcher and not a professional cryptographer.
Since I'm creating my own curriculum, ...

I came across this little HRNG widget and was really intrigued as I have been looking for a decent but afordable source for truly random bits to use in a one-time pad.
The question is, would a HRNG ...